首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24781篇
  免费   662篇
  国内免费   1篇
管理学   3126篇
民族学   145篇
人才学   6篇
人口学   2289篇
丛书文集   125篇
教育普及   2篇
理论方法论   2213篇
现状及发展   1篇
综合类   301篇
社会学   11931篇
统计学   5305篇
  2023年   137篇
  2022年   99篇
  2021年   137篇
  2020年   383篇
  2019年   608篇
  2018年   627篇
  2017年   873篇
  2016年   629篇
  2015年   467篇
  2014年   607篇
  2013年   4310篇
  2012年   836篇
  2011年   768篇
  2010年   598篇
  2009年   591篇
  2008年   664篇
  2007年   643篇
  2006年   618篇
  2005年   567篇
  2004年   543篇
  2003年   500篇
  2002年   531篇
  2001年   630篇
  2000年   552篇
  1999年   540篇
  1998年   428篇
  1997年   387篇
  1996年   373篇
  1995年   358篇
  1994年   377篇
  1993年   335篇
  1992年   398篇
  1991年   395篇
  1990年   354篇
  1989年   341篇
  1988年   324篇
  1987年   302篇
  1986年   295篇
  1985年   318篇
  1984年   309篇
  1983年   287篇
  1982年   238篇
  1981年   198篇
  1980年   215篇
  1979年   224篇
  1978年   186篇
  1977年   183篇
  1976年   158篇
  1975年   158篇
  1974年   131篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
Emergency departments (EDs) are an important health care setting for the identification of elder abuse (EA). Our objective was to develop an ED-based tool to identify EA. The initial tool included a brief cognitive assessment, questions to detect multiple domains of EA, and a physical examination. Refinement of the tool was based on input from clinical experts and nurse and patient feedback. The revised tool, which included 15 questions about EA, was then tested in an academic ED. We calculated the inter-rater reliability, sensitivity, and specificity of individual EA questions. Among ED patients age≥65 (N = 259), 17 (7%) screened positive for suspicion of EA. We identified a combination of six questions that cover the included domains of EA, demonstrated good or excellent inter-rater reliability, and had a sensitivity and specificity of 94% (95% confidence interval (CI) 71–100%) and 90% (95% CI 85–93%), respectively. These results inform a proposed screening tool for multisite validation testing.  相似文献   
992.
Previous research outlines the correlates of childcare expulsion in the USA, yet researchers know little about how these correlates produce expulsion. This in‐depth qualitative analysis of 30 childcare providers’ accounts of expulsion finds a patterned process to expulsion: Teachers search for causes and solutions to challenging behaviours. When interventions fail, overwhelmed teachers shift their focus from ‘struggling’ children to ‘bad families’. Once the explanation of behaviour changes from within to outside of the child, expulsion is imminent. Interventions in teachers’ understandings, not only in children's behaviours, are discussed as a possible way to reduce expulsion.  相似文献   
993.
Abstract

This article provides findings of a qualitative study exploring the interactions of eight Deaf participants and one hearing ally with the justice system in Northern Ireland, where the Disability Discrimination Act requires solicitors to make ‘reasonable adjustments’ in order to provide effective access to Deaf clients. Three thematic categories emerged: (a) barriers to accessing justice, (b) work Deaf people do for access, and (c) the need to educate solicitors about access. A central strain ran through these themes: the idea that ‘reasonable adjustment’ must reflect the value of sign language interpreters in facilitating effective communication access for all the parties.  相似文献   
994.
Abstract

Individuals on the autism spectrum are at an increased risk of experiencing violence. This study sought to understand the opinions of adults on the spectrum regarding potential risk and protective factors for interpersonal violence. Twenty-two adults (12 men; 18 to 53 years of age) participated in semi-structured qualitative interviews. Interviews were recorded, transcribed, and analysed. The results of the qualitative analysis identified individual and contextual risk and protective factors. Protective themes focused on individual needs (awareness of the self and the environment, interpersonal knowledge/skills, skill building strategies) and supportive contexts (benefits of a trusted person, advocates, fostering acceptance and inclusion). There is a need for strategies to decrease the vulnerability to, and the impact of, interpersonal violence. Individuals on the spectrum have the capacity to provide important information regarding safety promotion and risk factors for interpersonal violence, and their expertise should play a role in guiding efforts that promote safety.  相似文献   
995.
For a connected graph \(G = \left( V,E\right) \), a set \(S\subseteq E(G)\) is called a total edge-to-vertex monophonic set of a connected graph G if the subgraph induced by S has no isolated edges. The total edge-to-vertex monophonic number \(m_{tev}(G)\) of G is the minimum cardinality of its total edge-to-vertex monophonic set of G. The total edge-to-vertex monophonic number of certain classes of graphs is determined and some of its general properties are studied. Connected graphs of size \(q \ge 3 \) with total edge-to-vertex monophonic number q is characterized. It is shown that for positive integers \(r_{m},d_{m}\) and \(l\ge 4\) with \(r_{m}< d_{m} \le 2 r_{m}\), there exists a connected graph G with \(\textit{rad}_ {m} G = r_{m}\), \(\textit{diam}_ {m} G = d_{m}\) and \(m_{tev}(G) = l\) and also shown that for every integers a and b with \(2 \le a \le b\), there exists a connected graph G such that \( m_{ev}\left( G\right) = b\) and \(m_{tev}(G) = a + b\). A forcing subset for S of minimum cardinality is a minimum forcing subset of S. The forcing total edge-to-vertex monophonic number of S, denoted by \(f_{tev}(S)\) is the cardinality of a minimum forcing subset of S. The forcing total edge-to-vertex monophonic number of G, denoted by \(f_{tev}(G) = \textit{min}\{f_{tev}(S)\}\), where the minimum is taken over all total edge-to-vertex monophonic set S in G. The forcing total edge-to-vertex monophonic number of certain classes of graphs are determined and some of its general properties are studied. It is shown that for every integers a and b with \(0 \le a \le b\) and \(b \ge 2\), there exists a connected graph G such that \(f_{tev}(G) = a\) and \( m _{tev}(G) = b\), where \( f _{tev}(G)\) is the forcing total edge-to-vertex monophonic number of G.  相似文献   
996.
The purpose of this research was to determine what behaviourally distinguishes effective and ineffective managers within a Moroccan Higher Education Institution (HEI). The critical incident technique (CIT) was the methodology deployed to collect data from participants in terms of how they perceive managers as either effective or ineffective. The collected data (CIs) were subjected to content and thematic analysis that resulted in derived positive and negative behavioural statements (BSs). A total of 42 participants/informants were interviewed and revealed a total of 418 CIs, of which 189 were positive CIs and 229 were negative. The analysis revealed a total of 49 BSs, of which 19 were positive and 30 were negative behavioural indicators. The findings of this investigation bring empirical evidence to understand what and how managers are perceived as effective or ineffective in the Moroccan academic context and, therefore, adds to the literature. The information obtained can also provide rich information/knowledge that can be used as a basis to address the behavioural developmental needs of managers in HEIs. This research adds value by following by following two previous replication studies in a French and a Hungarian HEI; moreover, this study is the first to be conducted in the Moroccan/North African region.  相似文献   
997.
A simple connected graph G with 2n vertices is said to be k-extendable for an integer k with \(0<k<n\) if G contains a perfect matching and every matching of cardinality k in G is a subset of some perfect matching. Lakhal and Litzler (Inf Process Lett 65(1):11–16, 1998) discovered a polynomial algorithm that decides whether a bipartite graph is k-extendable. For general graphs, however, it has been an open problem whether there exists a polynomial algorithm. The new result presented in this paper is that the extendability problem is co-NP-complete.  相似文献   
998.
Network coding is a generalization of conventional routing methods that allows a network node to code information flows before forwarding them. While it has been theoretically proved that network coding can achieve maximum network throughput, theoretical results usually do not consider the stochastic nature in information processing and transmission, especially when the capacity of each arc becomes stochastic due to failure, attacks, or maintenance. Hence, the reliability measurement of network coding becomes an important issue to evaluate the performance of the network under various system settings. In this paper, we present analytical expressions to measure the reliability of multicast communications in coded networks, where network coding is most promising. We define the probability that a multicast rate can be transmitted through a coded packet network under a total transmission cost constraint as the reliability metric. To do this, we first introduce an exact mathematical formulation to construct multicast connections over coded packet networks under a limited transmission cost. We then propose an algorithm based on minimal paths to calculate the reliability measurement of multicast connections and analyze the complexity of the algorithm. Our results show that the reliability of multicast routing with network coding improved significantly compared to the case of multicast routing without network coding.  相似文献   
999.
In this work, we propose an optimization approach for constructing various classes of circulant combinatorial designs that can be defined in terms of autocorrelation. The problem is formulated as a so-called feasibility problem having three sets, to which the Douglas–Rachford projection algorithm is applied. The approach is illustrated on three different classes of circulant combinatorial designs: circulant weighing matrices, D-optimal matrices of circulant type, and Hadamard matrices with two circulant cores. Furthermore, we explicitly construct two new circulant weighing matrices, a CW(126, 64) and a CW(198, 100), whose existence was previously marked as unresolved in the most recent version of Strassler’s table.  相似文献   
1000.
Psychotherapy requires a high qualification which is gained mainly in practical training. Own treatments of mentally ill patients during training requires close-meshed supervision. This also has to meet the highest standards, which require a systematic training as a training supervisor. This article discusses the various aspects that have to be taken into consideration in behavior therapy. Beyond adherence to therapy manuals, extremely complex interaction processes have to be taken into account that cannot be substantiated by the classical behavior therapy. To this extent, supervision appears as a bridge between science and the art of psychotherapy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号